Posts by Tag

CTF

Cronos - HTB

1 minute read

Posted:

The following are some useful concepts I was able to grasp from tackling the above HTB box.

Basic Pentesting - THM

less than 1 minute read

Posted:

I was able to complete a challenge posted on Try Hackme Website and below are a few takeaways from it.

Shocker - HTB

1 minute read

Posted:

Instead of doing a writeup I have opted to write a summary of the things that I learnt from solving the Shocker of Hack The Box.

Beep - HTB

2 minute read

Posted:

The following are a few takeaway points from the Beep box.

Back to top ↑

Cryptography

Numbers Systems

5 minute read

Posted:

Computers uses several number system to represent and work with numbers.The most popular ones are binary, octal, decimal and hexadecimal.

Beep - HTB

2 minute read

Posted:

The following are a few takeaway points from the Beep box.

Digital Signatures

3 minute read

Posted:

An electronic verification of the sender.

Cryptography

2 minute read

Posted:

Updated:

The science of secret writing with the intention of keeping the data secret.

Back to top ↑

HTB

Cronos - HTB

1 minute read

Posted:

The following are some useful concepts I was able to grasp from tackling the above HTB box.

Shocker - HTB

1 minute read

Posted:

Instead of doing a writeup I have opted to write a summary of the things that I learnt from solving the Shocker of Hack The Box.

Beep - HTB

2 minute read

Posted:

The following are a few takeaway points from the Beep box.

Back to top ↑

Azure

Azure Attack Paths Management

14 minute read

Posted:

Every object in azure (users, service principals, device, apps) combines to form attack paths that adversaries can find and exploit and take over your whole ...

Azure Cloud Pentesting

12 minute read

Posted:

The rise of cloud computing has seen many companies shifting their attention to adopting cloud services such as storage, network, database, and software appl...

Azure AD Single Sign On (SSO) - Sophos Firewall

5 minute read

Posted:

Single sign-on (SSO) is a technology which combines several different application login screens into one regardless of the domain, platform, or technology th...

Azure Powershell

5 minute read

Posted:

PowerShell is a command-based shell and scripting language used for task automation and as a configuration framework tool. PowerShell runs on Windows, Linux,...

Back to top ↑

Authentication

Azure Attack Paths Management

14 minute read

Posted:

Every object in azure (users, service principals, device, apps) combines to form attack paths that adversaries can find and exploit and take over your whole ...

Azure Cloud Pentesting

12 minute read

Posted:

The rise of cloud computing has seen many companies shifting their attention to adopting cloud services such as storage, network, database, and software appl...

Azure AD Single Sign On (SSO) - Sophos Firewall

5 minute read

Posted:

Single sign-on (SSO) is a technology which combines several different application login screens into one regardless of the domain, platform, or technology th...

Back to top ↑

Hashing

Digital Signatures

3 minute read

Posted:

An electronic verification of the sender.

Cryptography

2 minute read

Posted:

Updated:

The science of secret writing with the intention of keeping the data secret.

Back to top ↑

Encryption

Digital Signatures

3 minute read

Posted:

An electronic verification of the sender.

Cryptography

2 minute read

Posted:

Updated:

The science of secret writing with the intention of keeping the data secret.

Back to top ↑

Bash

Shocker - HTB

1 minute read

Posted:

Instead of doing a writeup I have opted to write a summary of the things that I learnt from solving the Shocker of Hack The Box.

Beep - HTB

2 minute read

Posted:

The following are a few takeaway points from the Beep box.

Back to top ↑

Shellshock

Shocker - HTB

1 minute read

Posted:

Instead of doing a writeup I have opted to write a summary of the things that I learnt from solving the Shocker of Hack The Box.

Beep - HTB

2 minute read

Posted:

The following are a few takeaway points from the Beep box.

Back to top ↑

SSH

Beep - HTB

2 minute read

Posted:

The following are a few takeaway points from the Beep box.

Back to top ↑

Dirty Cow

Cronos - HTB

1 minute read

Posted:

The following are some useful concepts I was able to grasp from tackling the above HTB box.

Back to top ↑

Pentesting

Azure Attack Paths Management

14 minute read

Posted:

Every object in azure (users, service principals, device, apps) combines to form attack paths that adversaries can find and exploit and take over your whole ...

Azure Cloud Pentesting

12 minute read

Posted:

The rise of cloud computing has seen many companies shifting their attention to adopting cloud services such as storage, network, database, and software appl...

Back to top ↑

Service Principal

Azure Attack Paths Management

14 minute read

Posted:

Every object in azure (users, service principals, device, apps) combines to form attack paths that adversaries can find and exploit and take over your whole ...

Azure Cloud Pentesting

12 minute read

Posted:

The rise of cloud computing has seen many companies shifting their attention to adopting cloud services such as storage, network, database, and software appl...

Back to top ↑

Privileges Escalation

Azure Attack Paths Management

14 minute read

Posted:

Every object in azure (users, service principals, device, apps) combines to form attack paths that adversaries can find and exploit and take over your whole ...

Azure Cloud Pentesting

12 minute read

Posted:

The rise of cloud computing has seen many companies shifting their attention to adopting cloud services such as storage, network, database, and software appl...

Back to top ↑

Kerberos

Cryptography

2 minute read

Posted:

Updated:

The science of secret writing with the intention of keeping the data secret.

Back to top ↑

RCE

PsExec

1 minute read

Posted:

A utility crafted by a developer named Mark Russinovich and his company SysInternals

Back to top ↑

Encoding

Digital Signatures

3 minute read

Posted:

An electronic verification of the sender.

Back to top ↑

SSL

Digital Signatures

3 minute read

Posted:

An electronic verification of the sender.

Back to top ↑

Linux

/dev/tcp

less than 1 minute read

Posted:

It’s pseudo device file ,opening tcp connection to socket.

Back to top ↑

Tcp

/dev/tcp

less than 1 minute read

Posted:

It’s pseudo device file ,opening tcp connection to socket.

Back to top ↑

Shell

/dev/tcp

less than 1 minute read

Posted:

It’s pseudo device file ,opening tcp connection to socket.

Back to top ↑

THM

Basic Pentesting - THM

less than 1 minute read

Posted:

I was able to complete a challenge posted on Try Hackme Website and below are a few takeaways from it.

Back to top ↑

Bruteforcing

Basic Pentesting - THM

less than 1 minute read

Posted:

I was able to complete a challenge posted on Try Hackme Website and below are a few takeaways from it.

Back to top ↑

Heartbleed

Back to top ↑

DNS

Cronos - HTB

1 minute read

Posted:

The following are some useful concepts I was able to grasp from tackling the above HTB box.

Back to top ↑

APACHE

Cronos - HTB

1 minute read

Posted:

The following are some useful concepts I was able to grasp from tackling the above HTB box.

Back to top ↑

sql

Cronos - HTB

1 minute read

Posted:

The following are some useful concepts I was able to grasp from tackling the above HTB box.

Back to top ↑

memory

Back to top ↑

stack

Back to top ↑

buffer overflow

Back to top ↑

shellcode

Back to top ↑

Active Directory

Attacking AD

8 minute read

Posted:

What is Active Directory

Back to top ↑

mim

Attacking AD

8 minute read

Posted:

What is Active Directory

Back to top ↑

LLMNR

Attacking AD

8 minute read

Posted:

What is Active Directory

Back to top ↑

kerberos. IPv6

Attacking AD

8 minute read

Posted:

What is Active Directory

Back to top ↑

Base64

Numbers Systems

5 minute read

Posted:

Computers uses several number system to represent and work with numbers.The most popular ones are binary, octal, decimal and hexadecimal.

Back to top ↑

Binary

Numbers Systems

5 minute read

Posted:

Computers uses several number system to represent and work with numbers.The most popular ones are binary, octal, decimal and hexadecimal.

Back to top ↑

Hexadecimal

Numbers Systems

5 minute read

Posted:

Computers uses several number system to represent and work with numbers.The most popular ones are binary, octal, decimal and hexadecimal.

Back to top ↑

Hashcat

Run Hashcat on Google Colab

1 minute read

Posted:

Hashcat is a popular and effective password cracker widely used by both penetration testers and sysadmins as well as criminals and spies. It can utilize your...

Back to top ↑

Cracking

Run Hashcat on Google Colab

1 minute read

Posted:

Hashcat is a popular and effective password cracker widely used by both penetration testers and sysadmins as well as criminals and spies. It can utilize your...

Back to top ↑

Powershell

Azure Powershell

5 minute read

Posted:

PowerShell is a command-based shell and scripting language used for task automation and as a configuration framework tool. PowerShell runs on Windows, Linux,...

Back to top ↑

Scripting

Azure Powershell

5 minute read

Posted:

PowerShell is a command-based shell and scripting language used for task automation and as a configuration framework tool. PowerShell runs on Windows, Linux,...

Back to top ↑

SSO

Azure AD Single Sign On (SSO) - Sophos Firewall

5 minute read

Posted:

Single sign-on (SSO) is a technology which combines several different application login screens into one regardless of the domain, platform, or technology th...

Back to top ↑

Firewall

Azure AD Single Sign On (SSO) - Sophos Firewall

5 minute read

Posted:

Single sign-on (SSO) is a technology which combines several different application login screens into one regardless of the domain, platform, or technology th...

Back to top ↑

Sophos

Azure AD Single Sign On (SSO) - Sophos Firewall

5 minute read

Posted:

Single sign-on (SSO) is a technology which combines several different application login screens into one regardless of the domain, platform, or technology th...

Back to top ↑

Bloodhound

Azure Attack Paths Management

14 minute read

Posted:

Every object in azure (users, service principals, device, apps) combines to form attack paths that adversaries can find and exploit and take over your whole ...

Back to top ↑

Azurehound

Azure Attack Paths Management

14 minute read

Posted:

Every object in azure (users, service principals, device, apps) combines to form attack paths that adversaries can find and exploit and take over your whole ...

Back to top ↑